IT eBooks

IT eBooks
Download, Read, Use

Network eBooks

Practical Packet Analysis, 3rd Edition Practical Packet Analysis, 3rd Edition

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You'll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet map. Practical Packet Analysis will show you how to: Monitor your network in real time and tap live network communications; Build customized capture and display filters; Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds; Explore modern exploits and malware at the packet level; Extract file ...
Computer Networking Problems and Solutions Computer Networking Problems and Solutions

Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. Its problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions, and showing how those solutions have been implemented in new and mature protocols. Part I considers data transport (the data plane). Part II covers protocols used to discover and use topology and reachability information (the control plane). Part III considers several common network designs and architectures, including data center fabrics, MPLS cores, and modern Software-Defined Wide Area Networks (SD-WAN). Principles that underlie technologies such as Software Defined Networks (SDNs) are considered throughout, as solutions to problems faced by all networking technologies. This guide is ideal for b ...
Raspberry Pi Networking Cookbook, 2nd Edition Raspberry Pi Networking Cookbook, 2nd Edition

With increasing interest in Maker Projects and the Internet of Things (IoT), students, scientists, and hobbyists are using the Raspberry Pi as a reliable, inexpensive platform to connect local devices to Internet services. This book begins with recipes that are essential to installing the Raspberry Pi and configuring it for network access. Then it continues with recipes on installing common networking services such as firewalls and file sharing. The final chapters include recipes for network monitoring, streaming data from the Raspberry Pi to IoT services, and using clusters of Raspberry Pis to store and analyze large volumes of data. ...
Neural Network Programming with Java Neural Network Programming with Java

Vast quantities of data are produced every second. In this context, neural networks become a powerful technique to extract useful knowledge from large amounts of raw, seemingly unrelated data. One of the most preferred languages for neural network programming is Java as it is easier to write code using it, and most of the most popular neural network packages around already exist for Java. This makes it a versatile programming language for neural networks. This book gives you a complete walkthrough of the process of developing basic to advanced practical examples based on neural networks with Java. You will first learn the basics of neural networks and their process of learning. We then focus on what Perceptrons are and their features. Next, you will implement self-organizing maps using the concepts you've learned. Furthermore, you will learn about some of the applications that are presented in this book such as weather forecasting, disease diagnosis, customer profil ...
Boost.Asio C++ Network Programming Cookbook Boost.Asio C++ Network Programming Cookbook

Starting with recipes demonstrating the execution of basic Boost.Asio operations, the book goes on to provide ready-to-use implementations of client and server applications from simple synchronous ones to powerful multithreaded scalable solutions. Finally, you are presented with advanced topics such as implementing a chat application, implementing an HTTP client, and adding SSL support. All the samples presented in the book are ready to be used in real projects just out of the box. As well as excellent practical examples, the book also includes extended supportive theoretical material on distributed application design and construction. ...
User Group Leadership User Group Leadership

This book is about starting and sustaining a technology user group. User groups are a wonderful way to connect with local and like - inded professionals for networking and learning. All the forums and social media on the internet can't replace face-to-face time spent discussing problems, upcoming technologies, and other pertinent topics. What every user group needs is leaders to organize meetings, find speakers, and connect the community. What every leader needs is good advice and guidance on how to begin a group and nurture new leadership to keep the group sustainable, and Michelle Malcher provides just that right sort of guidance in her book on User Group Leadership. This book is designed to help you understand what goes into starting and building a user group, giving you the tools and resources to do so. Learn what to expect before your first meeting, in the first three months, and in the first year. ...
Networking All-in-One For Dummies, 6th Edition Networking All-in-One For Dummies, 6th Edition

Are you ready to build a network but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks you through the basics. With nine self-contained minibooks that feature the latest updates on networking trends, including revised content for Windows 10 and Windows Server 2016, as well as updated coverage of broadband technologies, storage, and back-up, this fully-updated text will become your go-to guide for network development. This easy-to-understand guide gives you everything you need to dive into the network development game. Networking entails the connection of two or more computers, allowing them to share resources and exchange data. This is essential in the workplace, and has become highly popular in home settings as more and more people are connecting their home computers. Whether you're a network administrator or someone who wants to create a home-based network understanding how to build your network effectively i ...
Mastering Kali Linux Wireless Pentesting Mastering Kali Linux Wireless Pentesting

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. You will begin by gaining an understanding of setting up and optimizing your penetration testing environment for wireless assessments. Then, the book will take you through a typical assessment from reconnaissance, information gathering, and scanning the network through exploitation and data extraction from your target. You will get to know various ways to compromise the wireless network using browser exploits, vulnerabilities in firmware, web-based attacks, client-side exploits, and many other hacking methods. You will also discover how to ...
Raspberry Pi Networking Cookbook, 2nd Edition Raspberry Pi Networking Cookbook, 2nd Edition

With increasing interest in Maker Projects and the Internet of Things (IoT), students, scientists, and hobbyists are using the Raspberry Pi as a reliable, inexpensive platform to connect local devices to Internet services. This book begins with recipes that are essential to installing the Raspberry Pi and configuring it for network access. Then it continues with recipes on installing common networking services such as firewalls and file sharing. The final chapters include recipes for network monitoring, streaming data from the Raspberry Pi to IoT services, and using clusters of Raspberry Pis to store and analyze large volumes of data. ...
User Group Leadership User Group Leadership

This book is about starting and sustaining a technology user group. User groups are a wonderful way to connect with local and like - inded professionals for networking and learning. All the forums and social media on the internet can't replace face-to-face time spent discussing problems, upcoming technologies, and other pertinent topics. What every user group needs is leaders to organize meetings, find speakers, and connect the community. What every leader needs is good advice and guidance on how to begin a group and nurture new leadership to keep the group sustainable, and Michelle Malcher provides just that right sort of guidance in her book on User Group Leadership. This book is designed to help you understand what goes into starting and building a user group, giving you the tools and resources to do so. Learn what to expect before your first meeting, in the first three months, and in the first year. ...
Network Security Assessment, 3rd Edition Network Security Assessment, 3rd Edition

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing attacker techniques, along with effective countermeasures you can use immediately. Learn how to effectively test system components, including: Common services such as SSH, FTP, Kerberos, SNMP, and LDAP; Microsoft services, including NetBIOS, SMB, RPC, and RDP; SMTP, POP3, and IMAP email services; IPsec and PPTP services that provide secure network access; TLS protocols and features providing tr ...
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2018